A) symmetric key encryption
B) asymmetric key encryption
C) asymmetric key decryption
D) hash-based key encryption
Correct Answer
verified
Multiple Choice
A) cipher
B) plain text
C) key
D) cipher.
Correct Answer
verified
Multiple Choice
A) disaster
B) eavesdropping
C) information leakage
D) unchanged default password
Correct Answer
verified
Multiple Choice
A) 7
B) 3
C) 1
D) 4
Correct Answer
verified
Multiple Choice
A) confidentiality
B) integrity
C) authentication
D) non-repudiation
Correct Answer
verified
Multiple Choice
A) release of message content-passive attack
B) traffic analysis -passive attacks
C) release of message content- active attacks
D) traffic analysis -active attacks
Correct Answer
verified
Multiple Choice
A) network security
B) database security
C) information security
D) physical security
Correct Answer
verified
Multiple Choice
A) physical
B) data-link
C) network
D) application
Correct Answer
verified
Multiple Choice
A) confidentiality
B) integrity
C) non-repudiation
D) availability
Correct Answer
verified
Multiple Choice
A) bug
B) threat
C) vulnerability
D) attack
Correct Answer
verified
Multiple Choice
A) they help understanding hacking better
B) they are key elements to a security breach
C) they help understands security and its components better
D) they help to understand the cyber-crime better
Correct Answer
verified
Multiple Choice
A) confidentiality
B) integrity
C) authenticity
D) availability
Correct Answer
verified
Multiple Choice
A) access control, file deletion
B) network, file permission
C) access control, file permission
D) network, system
Correct Answer
verified
Multiple Choice
A) encryption
B) locking
C) deleting
D) backup
Correct Answer
verified
Multiple Choice
A) cipher
B) cryptography
C) encryption
D) decryption
Correct Answer
verified
Multiple Choice
A) 2
B) 1
C) 3
D) 4
Correct Answer
verified
Multiple Choice
A) release of message content-passive attack
B) traffic analysis -passive attacks
C) release of message content- active attacks
D) traffic analysis -active attacks
Correct Answer
verified
Multiple Choice
A) smurfing
B) denial of service
C) e-mail bombing
D) ping storm
Correct Answer
verified
Multiple Choice
A) confidentiality
B) integrity
C) authentication
D) availability
Correct Answer
verified
Multiple Choice
A) database hacking
B) data deletion
C) data tampering
D) data leakage
Correct Answer
verified
Showing 1 - 20 of 23
Related Exams